Are You Tired Of Throwing Money At A Mediocre IT Company?

We Can Help.

BOOK YOUR COMPLIMENTARY CONSULTATION TODAY

Fill In The Form Below

Privacy: We will keep your information safe and
will not be given to third parties!

Why You Need to Update Your iPhone Now

As of August 25, Apple issued a “critical iOS update” designed to patch multiple zero-day security vulnerabilities which could conceivably allow a cyber attacker full control of any iPhone remotely “simply by clicking a link,” as “Digital Goddess” Kim Komando put it in her update on this subject on August 26. For those not aware of recent developments in the hacker and cybersecurity world, a zero-day attack is one that exploits security vulnerabilities that the software engineers and sellers were previously unaware of. The specific threat has been named “Trident” by security outfit Lookout and Internet vigilante Citizen Lab, and can reputedly turn any iPhone – of any generation – into a data and privacy spying tool via the installation of sophisticated spyware.

Understanding Digital Spying

According to security researchers, once an iPhone is infected with said spyware, the device is then rendered a “digital spy” which attackers can then use to snoop and record information on and in the vicinity of the device via the camera and microphone. The spyware can:

Record phone calls

Log messages and texts

Track the location of iPhone owners

Record audio and video of in-person private conversations

Uncovering the Spyware Agenda

It was only after United Arab Emirates human rights defender Ahmed Mansoor’s iPhone was targeted with texts containing malicious links that the spyware “exploit chain” was uncovered by Lookout and Citizen Lab (Check out his full report here). Thanks to Mansoor’s better wisdom, he did not click on the links, but instead forwarded the messages to Citizen Lab researchers, who traced the links and spyware chain – with help from Lookout – to the zero-day 3-step exploit chain that could have resulted in a jailbroken iPhone and a spyware program called Pegasus being installed.

Exploiting Vulnerabilities

The main culprit in all this seems to be an organization called NSO Group Technologies Ltd., an outfit that has labelled itself “a leader in mobile and cellular cyber warfare”. It has been further determined that Trident has three main iOS security vulnerabilities, officially known as CVE-2016-4657, CVE-2016-4655 and CVE-2016-4656, an explanation of their security fault details found on the linked pages. All of this has led to Apple’s release of security update 9.3.5 on August 25th, which the company says is critical for all iPhone users to apply to their iPhones or iPads.

How to Update Your Apple Device

To implement Apple’s security fix, just go to Settings > General > Software Update, and your device will auto-check for available updates or latest version of iOS. It will show the 9.3.5 version as available. Tap on the “download and install” button to implement the update process. Your iPhone passcode may be required to update, but beyond that everything should be automatic. You should receive a message that says “Your software is now up to date.”

Acapella Technologies is the leader in providing managed IT services in New England. Contact our expert IT staff at (603) 647-1784 or send us an email at info@acapella.com if you have any concerns about iPhone updates and any mobile device security vulnerabilities, and we will be happy to answer any and all your questions.

Are You Tired Of Throwing Money At A Mediocre IT Company?

We Can Help.

BOOK YOUR COMPLIMENTARY CONSULTATION TODAY

Fill In The Form Below

Privacy: We will keep your information safe and
will not be given to third parties!

Sign Up For Our Newsletter

Stay Up To Date with the Latest IT News & Articles

Acapella Technologies

Stay Connected!

Our website uses cookies to provide the best browsing experience. Cookie-related data will not reveal your identity. Cookies are used to remember your display preferences such as font size and color settings when you browse from one page to another. Persistent cookies stay on your computer or mobile device until they expireor you delete them.If you want to decline the use of cookies, please adjust your computer settings. If you continue browsing our site, you are giving implied consent for the use of cookies. For details, view our Privacy Policy and Ad and Cookie Policy.